El Paso Ambulatory Clinic Policy and Procedure
|
|
|
- Dwain Maurice Holland
- 9 years ago
- Views:
Transcription
1 Title: Regulation Reference: CONTACT CENTER CALL MONITORING AND RECORDING Policy Number: EP 1.22 Effective Date: 1/2015 Policy Statement: It is the policy of the Texas Tech University Health Sciences Center at El Paso (TTUHSC El Paso) to record and monitor any call routed through and from a TTUHSC El Paso Contact Center. Scope and Distribution: The purpose of this policy is to establish procedures to manage call monitoring and recording in accordance with TTUHSC El Paso personnel and security requirements. Call monitoring, recording, storing and archiving of incoming calls to a TTUHSC El Paso Contact Center will be used to improve the service provided to callers and to support staff carrying out their responsibilities. Monitoring, recording, storing, and archiving incoming calls and screen shots will provide an accurate record for the following: a. Identifying Contact Center staff training/developmental needs. b. Protecting Contact Center staff from abusive or nuisance calls. c. Improving Contact Center staff performance and quality of service to our patients. d. Establishing facts in the event of a complaint either by a caller or a staff member and assist in resolution. e. Assisting in Contact Center quality control to identify issues in Contact Center procedures with the goal of improvement. f. Confirm calls are accurately and efficiently transcribed when needed. This policy applies to any call routed through and from a TTUHSC El Paso Contact Center in the ambulatory clinics. Definitions: 1. Contact Center: A contact center is an automated call distribution system used at TTUHSC El Paso to handle and manage patient phone calls. 2. Call: A call is defined as the voice call itself, as well as related workstation screen shots of the contact center agent handling the call. 3. Contact Center Manager: A contact center manager is the individual or designee who is responsible for the overall operations of a contact center and the software applications. 4. Contact Center Agent Supervisor: A contact center Supervisor is a Department employee assigned to oversee the performance of the contact center agents within that Department. 5. Contact Center Agent: A contact center agent is considered any employee who handles patient calls routed through the TTUHSC El Paso Contact Center. Page 1 of 5
2 6. Call monitoring: The listening to a live or recorded interaction between an incoming caller and an agent generally used in training and, on an ongoing basis, to ensure that customer service and productivity goals are being met. Procedure: 1. All TTUHSC El Paso contact center callers will be advised as part of the welcome message that calls may be monitored and/or recorded for service improvement purposes. 2. TTUHSC El Paso contact center shall be utilized strictly for the handling of business related calls. The system shall not be utilized for ANY personal/private matter of any kind. 3. Each Department shall notify the Contact Center Manager via TTUHSC , of each individual designated in their Department as a Contact Center Agent, and the Contact Center Agent Supervisor, as well as any additions or deletions. The Contact Center Manager will maintain a summary list of such individuals. 4. Contact Center Agent Supervisors will notify Contact Center agents, either at time of hire or upon assuming Contact Center responsibilities that any call routed through the TTUHSC El Paso Contact Center may be monitored and/or recorded. This information will also be included in the Position Description of all Contact Center agents. 5. Contact Center Agent Supervisors shall document that each employee is informed of the work place areas that are subject to monitoring and/or recording and that TTUHSC El Paso Contact Center phones should not be relied on as confidential if used for discussion of private matters. This will be accomplished by the Contact Center Agent signing the Notice of Monitoring (attachment A ). The original signed form will be forwarded along with the request for access to the AVAYA system. A copy of the form will be maintained by the Contact Center Agent Supervisor and Contact Center Manager. 6. Contact Center Managers shall notify agents of the standards on which their calls will be evaluated in writing prior to utilizing monitored calls for a formal evaluation or disciplinary process. 7. Contact Center Manager will identify and designate areas where recording takes place and verify appropriate personnel who have authority to access recorded data. 8. Contact Center Manager must seek further guidance from the Vice President for Human Resources if a recording has been identified as part of a disciplinary investigation. 9. Contact Center calls may be monitored live, or stored and reviewed via two mechanisms: Quality Management (QM) and Archive Recording. The Texas Tech University System Communication Services department shall store call recordings securely, with access to the recordings controlled and managed by Communication Services in conjunction with the TTUHSC El Paso Information Technology (IT) Security team. 10. Access to the recordings will be controlled by eraider login and will be restricted to TTUHSC El Paso Contact Center Managers and Supervisors designated by the senior person at the appropriate school, institute, operating unit, or department/division. All access to recorded calls is logged. Page 2 of 5
3 11. Communication Services will provide training on how to live monitor and access recorded calls and screen recording to Contact Center managers who require it. 12. The Quality Management functionality stores calls and related screen shots for a pre-defined period of time (currently 30 days) after the call. Contact Center Agent Supervisors or the Contact Center Manager may access these recordings at any time as deemed necessary to support the business operations of the clinic. 13. Certain calls may be identified as needing to be retained for a period greater than 30 days or indefinitely. Examples of such calls may include significant patient complaints, threats against individuals or the institution, or for use in the employee disciplinary processes. Such calls will be retained in the archive recording process. The process to archive a call is as follows: a. A call requiring archiving is identified by an authorized user of the AVAYA system. b. A request to archive the call is generated by the Contact Center Agent Supervisor to the Contact Center Manager via TTUHSC . The request should contain at a minimum i. Identifying information about the call including Call ID, caller number, date, and time ii. A brief description of the reason for the request to archive. c. The Contact Center Manager will forward the request to TTU System Communications. d. TTU System Communications will locate the recording and move it to a secure server for storage. e. Requests to access an archived recording may be initiated by the Contact Center Manager or Contact Center Agent Supervisor to the Contact Center Manager. These individuals are encouraged to communicate with Human Resources or the Office of General Counsel on campus prior to requesting the release of the recording. f. Release of the recording, or a transcript, will be made available to Human Resources or the Office of General Counsel on campus. In no circumstances, will the release be made directly to the Contact Center Manager or Contact Center Agent Supervisor. Release of the recording and / or transcript will be made to the Contact Center Manager or Contact Center Agent Supervisor by Human Resources or the Office of General Counsel. Violation of This Policy: Violation of any part of this operating policy may result in disciplinary action in accordance with other applicable TTUHSC policies. Right to Change Policy: TTUHSC El Paso reserves the right to interpret, change, modify, amend, or rescind this policy in whole or in part at any time without the consent of employees. Page 3 of 5
4 Policy Number: EP 1.22 Original Approval Date: 1/2015 Version Number: 1 Revision Date: Signatory approval on file by: Michael J. Romano, M.D. Associate Dean of Clinical Affairs Clinic Operations Committee, Chair Texas Tech University Health Sciences Center El Paso Page 4 of 5
5 Attachment A Notice of Monitoring During Use of Contact Center Phones. I have received a copy of the TTUHSC EP Ambulatory Policy # 1.22, Contact Center Call Monitoring and Recording. I am aware of the following 1. The use of the contact center should be restricted to business related calls. 2. All calls into and out of the contact center may be monitored live, are recorded and retained for a minimum of 30 days. 3. In the event I believe a call should be retained longer than 30 days, I should contact my supervisor. 4. I am aware that call recordings may be used for training, evaluation, and disciplinary processes. Department: Contact Center Agent Contact Center Agent Supervisor Date Date This form should be submitted, along with the request for AVAYA access, to the Contact Center Manager. A copy should be retained by the Department and the Contact Center Manager. Page 5 of 5
El Paso - Ambulatory Clinic Policy and Procedure
Regulation Reference: El Paso - Ambulatory Clinic Policy and Procedure Title: Disposal of Expired Medications Policy Number: EP 3.5 Policy Statement: Effective Date: 8/1/2014 It is the policy of Texas
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Online Employment System User Manual
Troy University Online Employment System User Manual People Admin Version 7 Human Resources April 2014 Table of Contents Introduction... 2 User Types and Access... 2 Creating a User Account... 3 Homepage...
How To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For
Banner HR Account Request System Login and Usage: Login: 1. Go to http://accounts.unh.edu 2. Click on the IT Accounts Management System button 3. Login Adding Security Roles After logging in the Home screen
Ttuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE
Ttuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE GGHSON FACULTY assembly The purpose of the Faculty Assembly shall be to: Facilitate involvement of the faculty in communication and
Information Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
Information Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002
Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
Drug and Alcohol Testing for Safety- and Security-sensitive Positions
[Minor revision posted 3/7/14 (replaces 1/27/12 edition)] Operating Policy and Procedure : Drug and Alcohol Testing for Safety- and Security-sensitive Positions DATE: March 7, 2014 PURPOSE: The purpose
Policies of the University of North Texas
Policies of the University of North Texas 8.5 Use of University Non-Wireless and Wireless Telephones, Telephone Lines, Fax Machines and Personal Computing Devices Chapter 14 Chapter Name Information Technology
EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION
EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION Risk Assessment Committee Statement of Purpose The Emergency Response Plan is a comprehensive framework for the management of critical incidents, issues, or
Texas Tech University Health Sciences Center-El Paso. Medical Equipment Management Plan
Texas Tech University Health Sciences Center-El Paso Medical Equipment Management Plan Medical Equipment Management Plan Contents I. Objective and Purpose II. III. IV. Selection and Acquisition Equipment
Operating Policy and Procedure. DATE: February 9, 2015
[Major revision posted 2/9/15 (replaces 9/19/12 edition)] Operating Policy and Procedure : Overtime DATE: February 9, 2015 PURPOSE: The purpose of this Operating Policy and Procedure (OP) is to establish
WHISTLEBLOWER LAW. Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government.
WHISTLEBLOWER LAW Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government. 5-301. Applicability. This subtitle applies to all employees and State employees who are applicants
FY16 Minimum Pay Plan for Utilities Operator Minimum Starting Pay. Pay Title
OPERATIONS DIVISION : Personnel Qualification System DATE: September 10, 2015 PURPOSE The purpose of this Operations Division Standard Operating Procedure (OD/SOP) is to set forth procedures for administration
BAPTIST HEALTH CORPORATE COMPLIANCE PLAN
BAPTIST HEALTH CORPORATE COMPLIANCE PLAN BAPTIST HEALTH and its subsidiaries have a long-standing reputation for conducting both business and patient care activities with the highest level of ethical behavior
UNIVERSITY COMPLIANCE PLAN
UNIVERSITY COMPLIANCE PLAN Objectives of the Compliance Program The University Compliance Program provides a proactive program that ensures full compliance with all applicable policies, procedures, laws
Policy on Background Checks and Credential Verifications
HUMAN RESOURCES Effective Date: October 2013 Date Revised: N/A Supersedes: Background Check Policy, Credential Verification Policy Related Policies: Responsible Office/Department: Human Resources Management
THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS
THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS This form allows students to grant third parties, including parents, access to their educational records
Supervisor Website Training Manual
Supervisor Website Training Manual Welcome to Eastern Connecticut State University s Student Employment Website! Making the connection between student applicants and supervisors easier than ever. The On-Campus
Applicant Online Guide
Applicant Online Guide Purpose This is a guide to assist applicants submit their application to Brunswick County for a posted position. System Compatibility 1.) This Application tool works best with Internet
St. John Fisher College Banner/ApplicationXtender Access Request Form
St. John Fisher College Banner/ApplicationXtender Access Request Form The Banner/ApplicationXtender Access Request Form consists of five pages, this instruction page and four pages for access request of
Hosted Voice Product Training Automatic Call Distributor (ACD)
Hosted Voice Product Training Automatic Call Distributor (ACD) 1 Agenda 1. Customer Resource Center 2. Logging In 3. Main Screen 4. Search Calls 5. Download Reports 6. Queues 8. Monitor 9. Whisper 10.
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
Hiring Procedures and Guidelines
Hiring Procedures and Guidelines 33.99.01.R0.01 Employment Practices Updated 10/06/2014 A Guide for Hiring This document is provided to be a guide for the hiring process. The document, tools referenced,
CUNY New York Workplace Violence Policy and Procedures
CUNY New York Workplace Violence Policy and Procedures The City University of New York has a longstanding commitment to promoting a safe and secure academic and work environment that promotes the achievement
Program Statement. U.S. Department of Justice Federal Bureau of Prisons
U.S. Department of Justice Federal Bureau of Prisons Program Statement OPI: CPD/CPB NUMBER: P5264.08 DATE: SUBJECT: Inmate Telephone Regulations CORRECTED COPY 2/11/2008" Boxed Bold - Federal Regulation
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Dispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members
Dispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members These operating procedures supplement the policy on Dispute Resolution for Administrative/Professional and
A Border Healthcare Dialogue
Texas Tech University Health Sciences Center and the Dartmouth Institute: A Border Healthcare Dialogue Saturday, November 3, 2012 El Paso Museum of Art 1 Arts Festival Plaza El Paso, Texas, 79901 CONFERENCE
ARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its
ARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its Constitution, making such regulations as it considers necessary
State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures
State University of New York at Potsdam Workplace Violence Prevention Policy and Procedures Revision Date: September 15, 2015 Page 1 of 7 TABLE OF CONTENTS Policy... 3 Statement... 3 Definitions... 3 Application
FERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel
FERPA Q &A for Banner Users November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA tutorial http://www.dartmouth.edu/~reg/guides/ferpa/ FERPA = Family Educational
Your Texas Benefits Card
Your Texas Benefits Card Provider Interactive Voice Response User Guide How to Access and Use the Provider IVR System to Access Medicaid Member Information Updated: October 10, 2013 Table of Contents Table
MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 5 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: October 19, 2006 Contact for More Information: Chief Privacy Officer 1303 A West Campus
BYLAWS of the Graduate School of Biomedical Sciences
BYLAWS of the Graduate School of Biomedical Sciences SECTION 1. Programs of the Graduate School of Biomedical Sciences The Graduate School of Biomedical Sciences (GSBS) of the Texas Tech University Health
PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS
The Johns Hopkins University Krieger School of Arts & Sciences/Whiting School of Engineering PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS Established March
INSTITUTIONAL COMPLIANCE PLAN
INSTITUTIONAL COMPLIANCE PLAN Responsible Party: Board of Trustees Contact: Institutional Compliance Office Original Effective Date: 02/16/2012 Last Revised Date: 10/13/2014 Contents I. SCOPE OF THE PLAN...
U.S. Department of Justice Office of the Inspector General Audit Division
AUDIT OF THE DRUG ENFORCEMENT ADMINISTRATION S LANGUAGE SERVICES CONTRACT WITH SOS INTERNATIONAL, LTD. CONTRACT NUMBER DJDEA-05-C-0020 DALLAS FIELD DIVISION U.S. Department of Justice Office of the Inspector
Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
TITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS
TITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS DIVISION 2. ACCREDITED LAW SCHOOL RULES Adopted by the Committee of Bar Examiners and Approved by the Board of Governors of The State Bar of California Effective
Administrative Procedures Manual. Management Information Services
I-23.10 Management Information Services The College owns and operates a local area network (LAN) that connects the College's computing hardware and services. Computing hardware refers to any device that
Visiting Scholar and Visiting Researcher Guidelines
Page 1 of 9 Visiting Scholar and Visiting Researcher Guidelines Section I. General Provisions A. Purpose Statement The University of Texas at Austin recognizes that individuals from other universities,
University of Louisiana System
Policy Number: M-17 University of Louisiana System Title: RECORDS RETENTION & Effective Date: OCTOBER 10, 2012 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum Each institution
CUSTOMER SERVICE Operational KPIs
CUSTOMER SERVICE Operational KPIs Page 1 of 10 Table of Contents SECTION I: CUSTOMER SERVICE STAFFING, STRUCTURE AND LOCATION(S)... 3 A. ORGANIZATIONAL STRUCTURE... 3 B. STAFFING... 4 C. CALL CENTER MEMBERSHIP
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
University Specialty Clinics and Palmetto Health Billing Compliance Plan
Introduction The University of South Carolina School of Medicine Educational Trust d/b/a University Specialty Clinics (USC) manages the clinical faculty practice plan of the University of South Carolina
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
Information Security Plan May 24, 2011
Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
UMDNJ COMPLIANCE PLAN
UMDNJ COMPLIANCE PLAN INTRODUCTION...2 COMPLIANCE OVERSIGHT 3 COMPLIANCE COMMITTEE STRUCTURE...4 CHIEF COMPLIANCE OFFICER S RESPONSIBILITIES...5 RESEARCH COMPLIANCE.5 UNIT IMPLEMENTATION.6 COMPLIANCE POLICIES
CREDIT CARD PROCESSING POLICY AND PROCEDURES
CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.
Procedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution
Minnesota State Colleges and Universities System Procedures Chapter 1B System Organization and Administration / Equal Education and Employment Opportunity Report/Complaint of Discrimination/Harassment
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
What is a definition of risk?
What is a definition of risk? Definition of Risk Risk is the probability or threat of any negative occurrence caused by internal or external vulnerabilities interfering with achieving objectives that may
DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING,
Page 1 of 6 DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING, JC #676 - Classified Management - Integrated Academic Administrator and Classified Manager Salary
